Loading
A flaw was found in the way qemu v1.3.0 and later (virtio-rng) validates addresses when guest accesses the config space of a virtio device. If the virtio device has zero/small sized config space, such as virtio-rng, a privileged guest user could use this flaw to access the matching host's qemu address space and thus increase their privileges on the host.
Use CWE-269, Qemu vendor hub and Qemu product page to widen CVE-2013-2016 into its surrounding weakness, vendor, and product context.
Compare it with CVE-2024-24474, CVE-2024-6519 and CVE-2024-7730 for nearby disclosures in the same product family.